DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG� RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT <http://issues.apache.org/bugzilla/show_bug.cgi?id=35292>. ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND� INSERTED IN THE BUG DATABASE.
http://issues.apache.org/bugzilla/show_bug.cgi?id=35292 [EMAIL PROTECTED] changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEEDINFO |ASSIGNED ------- Additional Comments From [EMAIL PROTECTED] 2005-06-10 19:52 ------- OK, there are a few alternatives here: - take the hit on the uncommon path where the read() doesn't get EOF first time through, and keep calling read()/apr_time_now() until 30 seconds have *really* passed pro: equally as safe as 1.3 code con: more overhead - bump the tmp buffer size to 8K and lower the read() timeout to 1 second. this way the server could eat 30*8K=245K bytes without additional overhead, giving a significantly better chance of getting the response to the client than just 15*512=~7K pro: little more overhead than current 2.0 code con: still less safe than 1.3 -- Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
